aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorromain <romain@FreeBSD.org>2019-02-22 03:49:00 +0800
committerromain <romain@FreeBSD.org>2019-02-22 03:49:00 +0800
commit41582e9623718e2445d33987b31c29d7d535fc49 (patch)
tree3e5ad4decf4e905b499bf2d571b49797b6ee23cd /security
parentc11202553aa104386fd62b817927dda5466c91bf (diff)
downloadfreebsd-ports-gnome-41582e9623718e2445d33987b31c29d7d535fc49.tar.gz
freebsd-ports-gnome-41582e9623718e2445d33987b31c29d7d535fc49.tar.zst
freebsd-ports-gnome-41582e9623718e2445d33987b31c29d7d535fc49.zip
Document sysutils/puppetserver* vulnerabilities.
PuppetServer bundles Bouncy Castle, so add affected ports to the Bouncy Castle entry. sysutils/puppetserver is EOL and will likely never get a fix; sysutils/puppetserver5 may get fixed in a future release of the 5.x branch; sysutils/puppetserver6 was fixed in the latest release. With hat: puppet
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml12
1 files changed, 12 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 5b11055aac18..6ed6651cc6ae 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -7287,6 +7287,18 @@ a PingInterval period.</p>
<name>bouncycastle15</name>
<range><lt>1.60</lt></range>
</package>
+ <package>
+ <name>puppetserver</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <name>puppetserver5</name>
+ <range><ge>0</ge></range>
+ </package>
+ <package>
+ <name>puppetserver6</name>
+ <range><lt>6.2.1</lt></range>
+ </package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">